Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
Resource
win10v2004-20240508-en
General
-
Target
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe
-
Size
1.9MB
-
MD5
50a2b658eee759c624817510dfaa5461
-
SHA1
0b92348b121d21e3ddb4c21d59447e3ad30706ae
-
SHA256
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a
-
SHA512
1fb4abbe4033112b605bb720ddf445fbd1a7dc1ad3cb90029416e37eb84f364ac637dfdf9940d908634107a54feb405a24d4e1bce158e53aab48ae64175960bc
-
SSDEEP
24576:qMyptg5dkAmL8jyLQLNW0yzotcSHVZwMz8gkyJ8fP4lw46lw4Pz9ELqjL5:3te3ow4+w4PzqLcL5
Malware Config
Extracted
darkcomet
1
anthraxgold.no-ip.info:666
DC_MUTEX-169BEXQ
-
gencode
M6QvjZgri1v2
-
install
false
-
offline_keylogger
false
-
persistence
false
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1148-211-0x0000000000400000-0x000000000040B000-memory.dmp UPX \Users\Admin\AppData\Roaming\test\test.exe UPX behavioral1/memory/2472-448-0x0000000000400000-0x00000000004B7000-memory.dmp UPX behavioral1/memory/1148-451-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2980-461-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2472-462-0x0000000000400000-0x00000000004B7000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
test.exetest.exetest.exepid process 1496 test.exe 2980 test.exe 2472 test.exe -
Loads dropped DLL 5 IoCs
Processes:
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exepid process 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe -
Processes:
resource yara_rule behavioral1/memory/1148-211-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2472-448-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1148-451-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2980-461-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2472-462-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\test\\test.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exetest.exedescription pid process target process PID 2868 set thread context of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 1496 set thread context of 2980 1496 test.exe test.exe PID 1496 set thread context of 2472 1496 test.exe test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
test.exetest.exedescription pid process Token: SeIncreaseQuotaPrivilege 2472 test.exe Token: SeSecurityPrivilege 2472 test.exe Token: SeTakeOwnershipPrivilege 2472 test.exe Token: SeLoadDriverPrivilege 2472 test.exe Token: SeSystemProfilePrivilege 2472 test.exe Token: SeSystemtimePrivilege 2472 test.exe Token: SeProfSingleProcessPrivilege 2472 test.exe Token: SeIncBasePriorityPrivilege 2472 test.exe Token: SeCreatePagefilePrivilege 2472 test.exe Token: SeBackupPrivilege 2472 test.exe Token: SeRestorePrivilege 2472 test.exe Token: SeShutdownPrivilege 2472 test.exe Token: SeDebugPrivilege 2472 test.exe Token: SeSystemEnvironmentPrivilege 2472 test.exe Token: SeChangeNotifyPrivilege 2472 test.exe Token: SeRemoteShutdownPrivilege 2472 test.exe Token: SeUndockPrivilege 2472 test.exe Token: SeManageVolumePrivilege 2472 test.exe Token: SeImpersonatePrivilege 2472 test.exe Token: SeCreateGlobalPrivilege 2472 test.exe Token: 33 2472 test.exe Token: 34 2472 test.exe Token: 35 2472 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe Token: SeDebugPrivilege 2980 test.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exetest.exetest.exepid process 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 1496 test.exe 2980 test.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.execmd.exetest.exedescription pid process target process PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 2868 wrote to memory of 1148 2868 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe PID 1148 wrote to memory of 1820 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe cmd.exe PID 1148 wrote to memory of 1820 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe cmd.exe PID 1148 wrote to memory of 1820 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe cmd.exe PID 1148 wrote to memory of 1820 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe cmd.exe PID 1820 wrote to memory of 1032 1820 cmd.exe reg.exe PID 1820 wrote to memory of 1032 1820 cmd.exe reg.exe PID 1820 wrote to memory of 1032 1820 cmd.exe reg.exe PID 1820 wrote to memory of 1032 1820 cmd.exe reg.exe PID 1148 wrote to memory of 1496 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe test.exe PID 1148 wrote to memory of 1496 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe test.exe PID 1148 wrote to memory of 1496 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe test.exe PID 1148 wrote to memory of 1496 1148 132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2980 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe PID 1496 wrote to memory of 2472 1496 test.exe test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"C:\Users\Admin\AppData\Local\Temp\132bcb3fbdc4ce06526ff798b80ab0c1825400695cff509ed025a3de61e4467a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LULAV.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\test\test.exe" /f4⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\test\test.exe"C:\Users\Admin\AppData\Roaming\test\test.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\LULAV.batFilesize
138B
MD5527683c48cc4c7190219814c77b72fe0
SHA1d995878a8f4b9824a0508039eeada5376be9a52d
SHA256bbebf3e66136e700d8e3e2e0c8f461cdd9d7e68fe5a18a235afe86344932fb4b
SHA512408a53b240c23fa34153ccc2b2315f28a9741121ecc9b76d50267ee62d78230e65574327369f83c779c781802c0c28f6c578703c01a67de46c3d44f71b814fa6
-
\Users\Admin\AppData\Roaming\test\test.exeFilesize
1.9MB
MD567af6afbfcb1321674769e589da9f475
SHA1b86310ebaa664e7fdb82681b33327f21df6c54ef
SHA256808ba5ee4ef3233b0d55248cd447da72968644f30d3a831bdf723da150e9d47b
SHA512c16ba72fc2a0a846e1cdf29c7ad743d19aee65abe64fed92518572b4c494de6da5a364f14f130383c08583cb662736ac0798d11b84ec771010d749f74d084609
-
memory/1148-211-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1148-451-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/2472-462-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2472-448-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/2868-21-0x0000000002C90000-0x0000000002C91000-memory.dmpFilesize
4KB
-
memory/2868-13-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/2868-73-0x0000000002BC0000-0x0000000002BC1000-memory.dmpFilesize
4KB
-
memory/2868-63-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/2868-61-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2868-53-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/2868-41-0x00000000006C0000-0x00000000007C0000-memory.dmpFilesize
1024KB
-
memory/2868-37-0x0000000002A10000-0x0000000002A11000-memory.dmpFilesize
4KB
-
memory/2868-33-0x0000000000820000-0x0000000000821000-memory.dmpFilesize
4KB
-
memory/2868-31-0x0000000000820000-0x0000000000821000-memory.dmpFilesize
4KB
-
memory/2868-29-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2868-27-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/2868-25-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/2868-23-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/2868-0-0x0000000000400000-0x000000000054B000-memory.dmpFilesize
1.3MB
-
memory/2868-19-0x0000000002C90000-0x0000000002C91000-memory.dmpFilesize
4KB
-
memory/2868-15-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/2868-81-0x0000000002E90000-0x0000000002E91000-memory.dmpFilesize
4KB
-
memory/2868-7-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2868-5-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/2868-3-0x0000000000880000-0x0000000000881000-memory.dmpFilesize
4KB
-
memory/2868-101-0x0000000000810000-0x0000000000811000-memory.dmpFilesize
4KB
-
memory/2868-109-0x0000000003660000-0x0000000003661000-memory.dmpFilesize
4KB
-
memory/2868-119-0x0000000003640000-0x0000000003641000-memory.dmpFilesize
4KB
-
memory/2868-127-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/2868-135-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/2868-143-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/2868-91-0x0000000002E10000-0x0000000002E11000-memory.dmpFilesize
4KB
-
memory/2868-99-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2868-100-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2868-35-0x0000000002A10000-0x0000000002A11000-memory.dmpFilesize
4KB
-
memory/2868-9-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2868-45-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/2980-461-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB